Fingerprint recognition with embedded presentation attacks detection:
are we ready?
- URL: http://arxiv.org/abs/2110.10567v1
- Date: Wed, 20 Oct 2021 13:53:16 GMT
- Title: Fingerprint recognition with embedded presentation attacks detection:
are we ready?
- Authors: Marco Micheletto, Gian Luca Marcialis, Giulia Orr\`u and Fabio Roli
- Abstract summary: The diffusion of fingerprint verification systems for security applications makes it urgent to investigate the embedding of software-based presentation attack algorithms (PAD) into such systems.
Current research did not state much about their effectiveness when embedded in fingerprint verification systems.
This paper proposes a performance simulator based on the probabilistic modeling of the relationships among the Receiver Operating Characteristics (ROC) of the two individual systems when PAD and verification stages are implemented sequentially.
- Score: 6.0168714922994075
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: The diffusion of fingerprint verification systems for security applications
makes it urgent to investigate the embedding of software-based presentation
attack detection algorithms (PAD) into such systems. Companies and institutions
need to know whether such integration would make the system more "secure" and
whether the technology available is ready, and, if so, at what operational
working conditions. Despite significant improvements, especially by adopting
deep learning approaches to fingerprint PAD, current research did not state
much about their effectiveness when embedded in fingerprint verification
systems. We believe that the lack of works is explained by the lack of
instruments to investigate the problem, that is, modeling the cause-effect
relationships when two non-zero error-free systems work together. Accordingly,
this paper explores the fusion of PAD into verification systems by proposing a
novel investigation instrument: a performance simulator based on the
probabilistic modeling of the relationships among the Receiver Operating
Characteristics (ROC) of the two individual systems when PAD and verification
stages are implemented sequentially. As a matter of fact, this is the most
straightforward, flexible, and widespread approach. We carry out simulations on
the PAD algorithms' ROCs submitted to the most recent editions of LivDet
(2017-2019), the state-of-the-art NIST Bozorth3, and the top-level Veryfinger
12 matchers. Reported experiments explore significant scenarios to get the
conditions under which fingerprint matching with embedded PAD can improve,
rather than degrade, the overall personal verification performance.
Related papers
- Data-Driven Distributionally Robust Safety Verification Using Barrier Certificates and Conditional Mean Embeddings [0.24578723416255752]
We develop scalable formal verification algorithms without shifting the problem to unrealistic assumptions.
In a pursuit of developing scalable formal verification algorithms without shifting the problem to unrealistic assumptions, we employ the concept of barrier certificates.
We show how to solve the resulting program efficiently using sum-of-squares optimization and a Gaussian process envelope.
arXiv Detail & Related papers (2024-03-15T17:32:02Z) - Towards General Visual-Linguistic Face Forgery Detection [95.73987327101143]
Deepfakes are realistic face manipulations that can pose serious threats to security, privacy, and trust.
Existing methods mostly treat this task as binary classification, which uses digital labels or mask signals to train the detection model.
We propose a novel paradigm named Visual-Linguistic Face Forgery Detection(VLFFD), which uses fine-grained sentence-level prompts as the annotation.
arXiv Detail & Related papers (2023-07-31T10:22:33Z) - When Authentication Is Not Enough: On the Security of Behavioral-Based Driver Authentication Systems [53.2306792009435]
We develop two lightweight driver authentication systems based on Random Forest and Recurrent Neural Network architectures.
We are the first to propose attacks against these systems by developing two novel evasion attacks, SMARTCAN and GANCAN.
Through our contributions, we aid practitioners in safely adopting these systems, help reduce car thefts, and enhance driver security.
arXiv Detail & Related papers (2023-06-09T14:33:26Z) - An Open Patch Generator based Fingerprint Presentation Attack Detection
using Generative Adversarial Network [3.5558308387389626]
Presentation Attack (PA) or spoofing is one of the threats caused by presenting a spoof of a genuine fingerprint to the sensor of Automatic Fingerprint Recognition Systems (AFRS)
This paper proposes a CNN based technique that uses a Generative Adversarial Network (GAN) to augment the dataset with spoof samples generated from the proposed Open Patch Generator (OPG)
An overall accuracy of 96.20%, 94.97%, and 92.90% has been achieved on the LivDet 2015, 2017, and 2019 databases, respectively under the LivDet protocol scenarios.
arXiv Detail & Related papers (2023-06-06T10:52:06Z) - ViT Unified: Joint Fingerprint Recognition and Presentation Attack
Detection [36.05807963935458]
We leverage a vision transformer architecture for joint spoof detection and matching.
We report competitive results with state-of-the-art (SOTA) models for both a sequential system and a unified architecture.
We demonstrate the capability of our unified model to achieve an average integrated matching (IM) accuracy of 98.87% across LivDet 2013 and 2015 CrossMatch sensors.
arXiv Detail & Related papers (2023-05-12T16:51:14Z) - Interactive System-wise Anomaly Detection [66.3766756452743]
Anomaly detection plays a fundamental role in various applications.
It is challenging for existing methods to handle the scenarios where the instances are systems whose characteristics are not readily observed as data.
We develop an end-to-end approach which includes an encoder-decoder module that learns system embeddings.
arXiv Detail & Related papers (2023-04-21T02:20:24Z) - Combining multiple matchers for fingerprint verification: A case study
in biosecure network of excellence [53.598636960435286]
Two reference systems for fingerprint verification have been tested together with two additional non-reference systems.
The experimental results show that the best recognition strategy involves both minutiae-based and correlation-based measurements.
arXiv Detail & Related papers (2022-12-04T19:49:05Z) - Multi Agent System for Machine Learning Under Uncertainty in Cyber
Physical Manufacturing System [78.60415450507706]
Recent advancements in predictive machine learning has led to its application in various use cases in manufacturing.
Most research focused on maximising predictive accuracy without addressing the uncertainty associated with it.
In this paper, we determine the sources of uncertainty in machine learning and establish the success criteria of a machine learning system to function well under uncertainty.
arXiv Detail & Related papers (2021-07-28T10:28:05Z) - No Need to Know Physics: Resilience of Process-based Model-free Anomaly
Detection for Industrial Control Systems [95.54151664013011]
We present a novel framework to generate adversarial spoofing signals that violate physical properties of the system.
We analyze four anomaly detectors published at top security conferences.
arXiv Detail & Related papers (2020-12-07T11:02:44Z) - Formal Verification of Robustness and Resilience of Learning-Enabled State Estimation Systems [20.491263196235376]
We focus on learning-enabled state estimation systems (LE-SESs), which have been widely used in robotics applications.
We study LE-SESs from the perspective of formal verification, which determines the satisfiabilty of a system model.
arXiv Detail & Related papers (2020-10-16T11:06:50Z) - A Survey on Unknown Presentation Attack Detection for Fingerprint [4.424609902825527]
Biometrics researchers have developed Presentation Attack Detection (PAD) methods as a countermeasure to presentation attacks (PA)
PAD is usually done by training a machine learning classifier for known attacks for a given dataset, and they achieve high accuracy.
We present a comprehensive survey on existing PAD algorithms for fingerprint recognition systems, specifically from the standpoint of detecting unknown PAD.
arXiv Detail & Related papers (2020-05-17T18:46:23Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.